5. Do they have multiple qualified technicians on staff who are familiar with your network?*

Yes

No

6. Do their technicians maintain current vendor certifications and participate in on-going training?*

Yes

No

7. Do they do provide Security Assessments on a scheduled basis – It is important to establish a baseline and consistent revaluate - removing vulnerabilities as they appear*

Yes

No

8. Do they provide eMail Services that are more than just hosting your email somewhere; services that include email delivery troubleshooting, domain name setup to validate your domain and email, hosted spam services with user friendly self-help features, true email archiving of record, and multi factor authentication, third party backup just in case something happens to that mailbox*

Yes

No

9. Do they tend to your security policies for your network to make sure passwords are changed on a regular basis, passwords are complex, screens lock at a specified idle time?*

Yes

No

10. Do they train your users and often! Teach them about data security and various kind of attacks, and your policies and procedures – providing web-based training and “done for you” security policies*

Yes

No

11. Do they protect your computers and data from malware, viruses, and cyber-attacks with advanced endpoint security? Advanced endpoint security protects against file-less and script based threats and can even rollback ransomware attack.*

Yes

No

12. Do they help you understand and enforce the utilization multi-factor authentication whenever you can for your network, banking, website and even social media?*

Yes

No

13. Do they keep Microsoft, Adobe, and Java products up to date for better security? Providing “critical update” services via automation to protect computers from the latest known attacks as soon as released.*

Yes

No

14. Do they keep real-time monitoring on what passwords and accounts have been posted on the Dark Web and notify you to be proactive in preventing a data breach? Scanning the Dark Web and taking action to protect businesses from stolen credentials that have been posted for sale is pertinent to staying one step ahead of the next hacker*

Yes

No

15. Have they installed a firewall and turned on the intrusion detection and intrusion prevention features? Having someone reviewing these log files is what keeps you protected*

Yes

No

16. Do they keep your Intellectual Property, Confidential Data encrypted at rest and in motion? What if a mobile device is lost or stolen, is their ability to wipe or ensure that it is encrypted*

Yes

No

17. Do they backup local? Backup to the cloud? Have an offline backup for each month of the year? Test your backups on a daily basis? Are they obsessed about backups? If you are not 100% sure you need to be!*